Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social worker attack knowledge representation and excavation method based on SOEKS

A technology of knowledge representation and knowledge, applied in the field of cyberspace security, can solve problems such as inability to form computers, inability to share knowledge, and inconsistencies in forms

Active Publication Date: 2017-09-29
CHENGDU UNIV OF INFORMATION TECH
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) In the existing research on social engineering attacks, everyone saves attack information in different formats and methods (some are stored as database tables, some are stored as txt files), which leads to the fragmentation and chaos of these information; and the information is abstracted as Inconsistent forms of knowledge lead to inconsistent levels of abstraction of information details; different levels of abstraction and abstract formats lead to inability to share knowledge among different researchers
[0007] 2) Guidance on how to prevent social worker attacks cannot be given theoretically, it all depends on the personnel's own experience accumulation
[0008] 3) Cannot form algorithms that can be applied by computers, automatically discover weak points of defense, and give early warning of possible social engineering attacks
[0009] 4) It is impossible to predict new social engineering attack methods, and can only defend against existing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social worker attack knowledge representation and excavation method based on SOEKS
  • Social worker attack knowledge representation and excavation method based on SOEKS
  • Social worker attack knowledge representation and excavation method based on SOEKS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0068] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0069] Such as figure 1 As shown, the SOEKS-based social engineering attack knowledge representation and mining method provided by the embodiment of the present invention includes:

[0070] S101: Perform SOEKS-based social engineering knowledge expression to facilitate the abstraction and sharing of social engineering attack knowledge;

[0071] S102: Construct a neural network based on SOEKS to mine the relationship between the attack state and the attack method, provide early warnin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network space security and discloses a social worker attack knowledge representation and excavation method based on an SOEKS. The method includes the steps that social worker knowledge representation based on the SOEKS is designed, and the social worker attack knowledge can be abstracted and shared; the relationship between neutral network excavation attack states and attack methods based on the SOEKS is established, an attack about to occur is subjected to early warning, meta-information about to be changed is subjected to early warning, and a user is reminded of defense in advance; combinations of a large quantity of meta-information and attack methods are excavated, and a new social worker attack mode is discovered. Social worker attacks are subjected to abstract knowledge representation for the first time; abstract social worker attack information based on the SOEKS is conveniently shared and subjected to experience accumulation; through mode excavation of the relationship between the social worker attack states and attack methods, attack steps can be predicted, defense weak links can be disclosed, existing defense is theoretically guided, and dependence on experience is reduced.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to a SOEKS-based social engineering attack knowledge representation and mining method. Background technique [0002] With the rapid development of the mobile Internet and the Internet of Things, various types of network attacks emerge in an endless stream. Among them, social engineering (hereinafter referred to as: social engineering) attack is one of the mainstream attack methods. Rely on the principles of social engineering and make full use of social engineering methods to obtain attack-related information, such as obtaining the target’s birthday, name, hobbies, and friend relationships from the personal Weibo homepage / Qzone, and then compose a targeted "dictionary" for users Crack the password, steal the account, pretend to be a friend to cheat, etc. Attack methods are constantly updated, making it impossible to defend against. [0003] In the prior...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06N3/04G06N3/08G06Q50/00
CPCG06F21/55G06N3/084G06Q50/01G06N3/045
Inventor 王娟张浩曦李飞吴春旺
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products